If this is your first visit, be sure to
check out the FAQ by clicking the
link above. You may have to register
before you can post: click the register link above to proceed. To start viewing messages,
select the forum that you want to visit from the selection below.

ROOT in *nix

hi,

I talk behalf of a great hackers convention
: Tha Phantom Menace ( Two thousand One )

We've been surprise when we have hacked 'up
some servers .
The user who was workin' on the ASP server
was workin' with a superuser.
So we have give tha commands to this
inside a shell for bugg the tempory memory
with a bug inside tha alpha n' intel microcodes
that was goin' to give us tha ROOT user.
In usd tha shell of tha DATA by ASP.
And we could sent two trojan succesively that
has gave the control ROOT very times we wanted.
Finaly we have killed our trojan servers.
And we have get every passwords/login and
all could have all thing but we have destroyed or
deny anything.

So , we have potect more tha server.

IT WAS AN MESSAGE DELIVED BY THA PH2K.
NIGGAZ YOU LAY LOW. (Ain't nuttin' but a shadow )

Boy ain't right

That boy is about one stroke shy of an orgasm. Apparently you haver to be a l337 HaX0r to understand that ****. If he was so good at running trojans you think he would learn how to spell in the process.

Re: ROOT in *nix

Originally posted by phantom2k
I talk behalf of a great hackers convention
: Tha Phantom Menace ( Two thousand One )

It is so 3|33t3 that nobody has even heard of it.

Originally posted by phantom2k
We've been surprise when we have hacked 'up
some servers .

We have been surprized that you even know how to use a
keyboard. Well sort of use a keyboad. As for hacking things up, now that you have had your practice...time to become a limberjack. You sure as hell don't have the brains to become a garbage truck driver.

Originally posted by phantom2k
The user who was workin' on the ASP server
was workin' with a superuser.

Re: ROOT in *nix

I talk behalf of a great hackers convention
: Tha Phantom Menace ( Two thousand One )

Hello everyone,

I am here on behalf of the great hackers convention called:The Phantom Menace 2001

We've been surprise when we have hacked 'up
some servers .

We were reading this book "hacking for dummies" and it came with all these point and click programs to gain administrative access to any UNIX box we desired.

The user who was workin' on the ASP server
was workin' with a superuser.
So we have give tha commands to this
inside a shell for bugg the tempory memory
with a bug inside tha alpha n' intel microcodes
that was goin' to give us tha ROOT user.

After we took control of the box, we spent hours trying to figure out what commands would bring up Internet Explorer so we could surf some porn sites.

In usd tha shell of tha DATA by ASP.
And we could sent two trojan succesively that
has gave the control ROOT very times we wanted.

After rebooting the machine 2 times in a row, we found out that the box had no password set and that's why we got in on the first try. So we assumed that we hacked this box so good, that the OS simply gave up and handed over full access to us

Finaly we have killed our trojan servers.
And we have get every passwords/login and
all could have all thing but we have destroyed or
deny anything.

After writing down the password (no password needed) we setup our own accounts with 255 character passwords so no one else could get in. But.... we forgot the passwords and now the box is actually password protected with a password so long, we won't be able to crack it for 1 million years.

So , we have potect more tha server.

Next time, we are going to hack into an elite windows95 box and use this to launch a massive attack against whitehouse.com or billgates.com because we hate micro$oft and government.

IT WAS AN MESSAGE DELIVED BY THA PH2K.
NIGGAZ YOU LAY LOW. (Ain't nuttin' but a shadow )

Next time someone switches all the letters around on my keyboard, I'm going to hit them over the head because I can't find all the vowels on it. My shadow RAM is awesome on my PC.